If you couldn’t make it to San Francisco for RSA Conference, we’re bringing you great content and news from the event on our blogs and social media channels.
We also broadcasted from RSA via podcast – bringing you the expert opinions of our top security gurus, who took time away from their presentations and booth talks to reflect on the interesting themes and serious discussions happening at the conference.
There’s so much going on in the security world, and Sophos experts cut through the noise succinctly and intelligently in our (brief, informative, fun) podcasts.
IT professionals, security vendors, and the media all converge at RSA Conference 2015 in San Francisco the week of April 20-24th, where Sophos is well represented by our security experts and our great staff.
We’re presenting some new research at the show, so you won’t want to miss our live demonstrations. We’re also sharing all the news from RSA on social media, providing in-depth coverage on Naked Security, and podcasting from the event!
What are we talking about at RSA? Here’s a rundown of the big topics Sophos security experts are exploring.
Who will cybercriminals target next? James Lyne, Sophos global head of security research, says gangs are creating new ways to attack ever more victims, and improving on the old ways to make more money.
In a new video from the Wall Street Journal, James sounds off on recent and emerging trends in cybercrime, and talks about what’s coming next for security of the Internet of Things (IoT).
We are well into the 21st century, but it is astonishing how people can still believe that Linux-based operating systems are completely secure. Indeed, “Linux” and “security” are two words that you rarely see together.
Just as some people believe Macs are immune to viruses, some Linux users have the same misconception – and who can blame them? After all, vendors have been telling them that for years.
In 2012, after an exponential rise of OS X malware (such as MacDefender and Flashback), Apple decided to change its homepage by removing sentences like “It doesn’t get PC viruses.”
The notorious PlugX APT group is continuing to evolve and launch campaigns, most recently a five-month-long campaign targeting organizations in India.
PlugX now uses a new backdoor technique – hiding the payload in the Windows registry instead of writing it as a file on disk – according to a new technical paper from SophosLabs Principal Researcher Gabor Szappanos.
Although not unique to PlugX, this backdoor approach is still uncommon and limited to a few relatively sophisticated malware families.
Many highly effective hacking groups associated with malware and advanced persistent threats (APTs) appear to lack an understanding of the technical exploits they use. They also fail to adequately test their exploits for effectiveness before unleashing them on their victims.
Gabor Szappanos of SophosLabs evaluated the malware and APT campaigns of several groups that all leveraged a particular exploit — a sophisticated attack against a specific version of Microsoft Office.
In a just-published technical paper, Gabor details how none of the groups he analyzed were able to modify the attack enough to infect other versions of Office, even though several versions were theoretically vulnerable to the same type of attack.
As part of Data Privacy Day on Wednesday, January 28th, the IAPP will be hosting casual “Privacy After Hours” social meetings at cities in Brazil, Canada, Columbia, Finland, Germany, Netherlands, Slovakia, UK and USA, to discuss an issue that’s on a lot of people’s minds these days — privacy.
Whether as part of business or personal life, information privacy and security is now an aspect of day-to-day life. So if you have any concerns or interests in privacy matters, then please feel welcome to come along for discussion, or simply to relax and get to know other people with practical or personal involvements in privacy issues.